116Articles
9Categories
2024-09-26Date
🚨
Ivanti vTM Flaw Added To Known Exploited Vulnerabilities Catalog
KEV
🐛
EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?
🐛
Critical SQL Injection Vulnerability Discovered in ‘The Events Calendar’ WordPress Plugin
🐛
TeamViewer Urges Users to Patch Privilege Escalation Flaws
🐛
Update: GitLab Backports Fix for CVE-2024-45409 to Older Versions
🐛
Critical Vulnerability in pgAdmin Puts User Data at Risk
🐛
Critical Vulnerabilities Found in Proroute H685t-w 4G Router
🐛
Chromium: CVE-2024-9123 Integer overflow in Skia
🐛
Chromium: CVE-2024-9122 Type Confusion in V8
🐛
Chromium: CVE-2024-9121 Inappropriate implementation in V8
🐛
Chromium: CVE-2024-9120 Use after free in Dawn
⚠️
Zero trust, not no trust: A practical guide to implementing ZTNA
⚠️
Flax Typhoon’s Botnet Actively Exploiting 66 Vulnerabilities In Various Devices
⚠️
Beware the risks of vulnerable VPNs: update, maintain, monitor, and protect
⚠️
Critical Arc Browser Vulnerability Let Attackers Execute Remote Code
⚠️
Open Source C2 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks
⚠️
Microsoft Warns Of Vanilla Tempest Hackers Attacking Healthcare Sector
⚠️
Attackers impersonate freight companies in double brokering scams
⚠️
TeamTNT Hackers Attacking VPS Servers Running CentOS
⚠️
Researchers Backdoored Azure Automation Account Packages And Runtime Environments
⚠️
New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers
⚠️
Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce
⚠️
RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus
⚠️
Cloud Security Podcast by Google » EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!
⚠️
Fortifying the Weakest Link: How to Safeguard Against Supply Chain Cyberattacks
⚠️
Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware
⚠️
Chinese hackers allegedly hacked US ISPs for cyber espionage
⚠️
Automattic blocks WP Engine’s access to WordPress resources
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
SAP SE revamps application security scanning using simulation and automation
⚠️
Remote Code Execution, DoS Vulnerabilities Patched In OpenPLC
⚠️
Remote Code Execution, DoS Vulnerabilities Patched in OpenPLC
⚠️
Here are the top 3 causes of breaches – and how to mitigate them
⚠️
Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates
⚠️
Cisco Releases Security Updates for IOS and IOS XE Software
⚠️
Kaspersky defends force-replacing its security software without users’ explicit consent
⚠️
Zero-Day Vulnerabilities in Automatic Tank Gauge Systems
⚠️
Cryptohack Roundup: BingX, Truflation Exploits
⚠️
AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844
⚠️
Memory-Safe Coding Cuts Android System Flaws by 75%
⚠️
Threat Actors Leverage Docker Swarm and Kubernetes to Mine Cryptocurrency at Scale
⚠️
Pure Storage Reveals CVSS 10 Vulnerabilities, Putting FlashArray, FlashBlade Systems at Risk
⚠️
Critical Flaw in RAISECOM Gateways Actively Exploited, Exposing Thousands to Remote Attacks
KEV
⚠️
New Rust-based Splinter Post-Exploitation Tool Poses Major Risk
⚠️
Proxmox Virtual Environment and Mail Gateway Exposed to Critical API Vulnerability
⚠️
Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk
⚠️
Patch for Critical CUPS vulnerability: Don't Panic, (Thu, Sep 26th)
⚠️
Security compliance unicorn Drata lays off 9% of its workforce
⚠️
Visa Acquires AI Leader Featurespace for Payments Protection
⚠️
CUPS flaws enable Linux remote code execution, but there’s a catch
📢
NIST proposes barring some of the most nonsensical password rules
📢
CISO Tradecraft podcast #199 - How to Secure Generative AI
📢
Israeli Group Claims Lebanon Water Hack as CISA Reiterates Warning on Simple ICS Attacks
📢
CISA warns hackers targeting industrial systems with “unsophisticated methods” as claims made of Lebanon water hack
📢
NIST Proposes Barring Some Of The Most Nonsensical Password Rules
📢
State Lawmakers to Give Banks Tools to Fight Elder Fraud
📢
Foxit security advisory (AV24-542)
📢
GitLab security advisory (AV24-543)
📢
Breach Roundup: How to Spot North Korean IT Workers
📢
NIST Calls for Major Overhaul in Typical Password Practices
🔥
Hackers Weaponizing PDF files To Deliver New SnipBot Malware
🔥
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
🔥
Sophos: Attacks Drop in Nearly All Sectors But Healthcare
🔥
Police Are Probing a Cyberattack on Wi-Fi Networks at UK Train Stations
🔥
Ransomware on the rise: Healthcare industry attack trends 2024
🔥
India’s Star Health says it’s investigating after hacker posts stolen medical data
🔥
U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex
🔥
Cyberattack Investigated At UK's Busiest Train Stations
🔥
US sanctions crypto exchanges used by Russian ransomware gangs
🔥
'Vanilla Tempest' Now Using INC Ransomware in Health Sector
🔥
Kryptina RaaS: From Unsellable Cast-Off to Enterprise Ransomware
🔥
Data exfiltration using RAMBO & PIXHELL | Kaspersky official blog
🔥
Unit 42 Incident Response Retainers Enhance Organizational Resilience
🔥
New RomCom malware variant 'SnipBot' spotted in data theft attacks
🔥
Cybersecurity Compass: Bridging the Communication Gap
🔥
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
🕵️
OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary], (Wed, Sep 25th)
🕵️
ISC Stormcast For Thursday, September 26th, 2024 https://isc.sans.edu/podcastdetail/9154, (Thu, Sep 26th)
🕵️
Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign
🕵️
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities
🕵️
Beware Of Fake Captcha Attacks That Delivers Lumma Stealer Malware
🕵️
Russian Hackers Registering Domains Targeting US Tech Brands
🕵️
Beware Of Fake Verify You Are A Human Request That Delivers Malware
🕵️
Octo2 Android Malware Attacking To Steal Banking Credentials
🕵️
An Analysis of the EU’s Cyber Resilience Act
🕵️
US Transportation and Logistics Firms Targeted With Infostealers, Backdoors
🕵️
N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
🕵️
Cisco Patches High-Severity Vulnerabilities in IOS Software
🕵️
Google Sees Drop in Memory Safety Bugs in Android as Code Matures
🕵️
Cryptography DEEPEST LORE
🕵️
OpenAI Exits, Appointments and New Corporate Model
🕵️
Critical Nvidia Container Flaw Exposes Cloud AI Systems to Host Takeover
🕵️
Unsophisticated Methods - PSW #844
🕵️
Proof of Concept: Boosting Security and Taming AI 'Lies'
🕵️
Parsec Remote Access installed without user knowing
🕵️
X Releases Its First Transparency Report Since Elon Musk’s Takeover
🕵️
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
🌐
Inside SnipBot: The Latest RomCom Malware Variant
🌐
RecordStealer: A Case Study in the Persistent Threat of Info-Stealing Malware
🌐
Cracked Software or Cyber Trap? The Rising Danger of AsyncRAT Malware
🌐
Inaugural World Tour 2024 Survey Findings
🎙️
Smashing Security podcast #386: The $230 million crypto handbag heist, and misinformation on social media
🎙️
Transatlantic Cable podcast episode 364 | Kaspersky official blog
📡
Sophos named a Leader in the 2024 IDC MarketScape for European MDR Services
📡
HPE Aruba Networking fixes critical flaws impacting Access Points
📡
The Tor Project merges with Tails, a Linux-based portable OS focused on privacy
📡
Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
📡
Fake WalletConnect app on Google Play steals Android users’ crypto
📡
Joint guidance on detecting and mitigating Active Directory compromises
📡
When UK rail stations’ Wi-Fi was defaced by hackers the only casualty was the truth
📡
AI Meets SAST: Reimagining the Future of Static Analysis | Live Webinar
📡
Hacker Plants False Memories In ChatGPT To Steal User Data In Perpetuity
📡
Cisco Patches High Severity Vulnerabilities In IOS
📡
China's Salt Typhoon Cyber Spies Are Deep Inside US ISPs
📡
Tails OS merges with Tor Project for better privacy, security
📡
Kia dealer portal flaw could let attackers hack millions of cars